Library Search:
Table of Contents Summary Contents Deployment and Installation Center System Requirements Preparing for Installation Obtaining SQL Server Web Filter or Web Security (software-based) Web Security All Installing Web Security All components Adding the TRITON - Data Security module General Deployment Recommendations for Web Security Network considerations Component limits and ratios Required external resources Deploying transparent identification agents Maximizing system performance Hardware recommendations for stand-alone deployments of Web Filter or Web Security Remote Filtering Server and Client Deploying Network Agent Network Agent Network Agent location Locating Network Agent in single segment network Locating Network Agent in multiple segment network Connecting Network Agent to a hub Switched networks with a single Network Agent Switched networks with multiple Network Agents Network Agent on gateway Network Agent and multiple NICs NAT and Network Agent deployment Integrating Web Security with Other Products Integrating Web Security with Content Gateway Integrating Web Security with Microsoft ISA Server or Forefront TMG Integrating Web Security with Cisco Integrating Web Security with Check Point Integrating Web Security with Squid Web Proxy Cache Integrating Web Security with Citrix Other integrations for Web Security Web Security Distributed Enterprise Deployments Web Security basic distributed enterprise topology Web Security filtering remote sites Web Security distributed enterprise deployment models Web Security distributed deployments and secure VPN connections Web Security Gateway (software-based) Citrix Integration Supported Citrix versions Citrix client computers Filtering Citrix server users Installing the Citrix Integration Service Upgrading Citrix Integration Service to 7.6 Configuring user access on Citrix servers Initial Setup of Citrix integration Cisco Integration Configuring a Cisco Security Appliance Cisco integration command conventions Cisco integration configuration procedure User-based filtering for Cisco integration Upgrading Cisco PIX Firewall software to version 7.0 may stop Web filtering Configuring a Cisco IOS Router Cisco IOS startup configuration Cisco IOS configuration commands Cisco IOS executable commands Configuring a Cisco Content Engine Cisco Content Engine Web-based interface Cisco Content Engine console or telnet session Verifying Cisco Content Engine configuration Configuring firewalls or routers when integrating with Cisco Content Engine Cisco Content Engine and browser access to the Internet Microsoft ISA Server or Forefront TMG Integration How Websense filtering works with ISA/TMG Supported ISA Server and Forefront TMG versions Installing Web Security to integrate with ISA Server or Forefront TMG Upgrading Web Security when integrated with ISA Server or Forefront TMG Removing the ISAPI Filter Plug-In Converting to an integration with ISA Server or Forefront TMG ISA Server or Forefront TMG initial setup Enabling communication with the Log Database when integrated with ISA Server or Forefront TMG WinSOCK and SOCKS proxy servers Configuring for ISA/TMG using non-Web-Proxy clients Configuring the ISAPI Filter plug-in to ignore specific traffic Authentication when integrated with ISA Server or Forefront TMG Troubleshooting integration with ISA Server or Forefront TMG Squid Web Proxy Cache Integration Supported Squid versions Client computers and Squid integration How Websense filtering works when integrated with Squid Web Proxy Cache HTTPS blocking when integrated with Squid Installing Web Filter or Web Security to integrate with Squid Web Proxy Cache Upgrading the Squid plug-in Squid Web Proxy Cache integration initial setup Converting Web Filter or Web Security to be integrated with Squid Web Proxy Cache Authentication when integrated with Squid Web Proxy Cache Troubleshooting Squid Web Proxy Cache integration Check Point Integration Configuring Check Point Products to Work with Web Filter or Web Security Configuring Check Point Secure Communication Troubleshooting Check Point Integration Universal Integrations Installing Web Security Components on Linux Starting the Web Security Linux installer Installing all Web security filtering components on Linux Installing Web Security components on Linux Policy Server Connection Screen Policy Broker Connection Screen Filtering Service Communication Screen Multiple Network Cards Screen Integration Option Screen Select Integration Screen Network Agent and Firewall Screen Filtering Plug-In Screen Squid Configuration Screen Network Card Selection Screen Filtering Feedback Screen Directory Service Access Screen Remote Filtering Communication Screen Remote Filtering Pass Phrase Screen Filtering Service Information for Remote Filtering Screen Web Security Gateway Anywhere (software-based) Websense Content Gateway Installing Web Security components to work with Websense Content Gateway Preparing to install Websense Content Gateway Installing Websense Content Gateway Deploying Websense Content Gateway Content Gateway deployment issues Content Gateway explicit and transparent proxy deployments Special Content Gateway deployment scenarios Chaining Content Gateway with other Proxies Web Security Gateway (appliance-based) Setting up the appliance Installing off-appliance or optional components Web Security Gateway Anywhere (appliance-based) Setting up the appliance Installing off-appliance or optional components TRITON management server as policy source for filtering-only appliance Data Security Installing Data Security on a virtual machine Installing the ESXi platform Customizing ESXi Installing the VMware Client Installing the license and setting the time Configuring an additional NIC Creating the Data Security virtual machine Planning Data Security Deployment Deciding what data to protect Determining where your confidential data resides Determining your information flow Defining the business owners for the data Deciding who will manage incidents Planning access control Analyzing network structure Planning network resources Most common deployments Planning a phased approach Choosing and Deploying Data Security Agents Protector Mobile agent SMTP agent Microsoft ISA/TMG agent Printer agent Integration agent The crawler Troubleshooting Data Security agent deployment Integrating Data Security with Existing Infrastructure Working with existing email infrastructure Working with Web proxies Working with shared drives Working with user directory servers Working with Exchange servers Working with IBM Lotus Domino and Lotus Notes Scaling Data Security When does your system need to grow? Adding modules to your deployment Data Security Protector CLI Email Security Gateway (V5000 G2) Setting up the appliance Installing Email Security Log Server Email Security Gateway (V10000 G2) Setting up the appliance Installing Email Security Log Server Websense Email Security Gateway Deployment Email Security Gateway system requirements Email Security Gateway single-appliance deployments Email Security Gateway multiple-appliance deployments Web and Email Security Gateway (V10000 G2) Setting up the appliance Installing off-appliance or optional components Web Security Gateway Anywhere and Email Security Gateway (V10000 G2) Setting up the appliance Installing off-appliance or optional components TRITON Enterprise (V10000 G2) Installing off-appliance or optional Web Security components Creating a TRITON Management Server Installing the Web Security module for TRITON Unified Security Center Installing the Data Security module for TRITON Unified Security Center Installing the Email Security module for TRITON Unified Security Center Custom Deployment Starting a custom installation Installing TRITON Infrastructure Installing Web Security components Policy Server Connection Screen Policy Broker Connection Screen Filtering Service Communication Screen Multiple Network Cards Screen Active Directory Screen Computer Browser Screen Integration Option Screen Select Integration Screen Network Agent and Firewall Screen Filtering Plug-In Screen Squid Configuration Screen Network Card Selection Screen Database Information Screen Log Database Location Screen Optimize Log Database Size Screen Filtering Feedback Screen Directory Service Access Screen Remote Filtering Communication Screen Remote Filtering Pass Phrase Screen Filtering Service Information for Remote Filtering Screen Turning on the Computer Browser service Installing with SQL Server Installing Data Security Components Installing Email Security Components Installing SQL Server 2008 R2 Express (without TRITON Infrastructure) Components TRITON management server TRITON Unified Security Center TRITON Infrastructure SQL Server 2008 R2 Express Policy Broker Policy Server Filtering Service Network Agent Usage Monitor TRITON - Web Security Web Security Log Server User Service DC Agent eDirectory Agent RADIUS Agent Logon Agent Logon Application Filtering Plug-in Remote Filtering Client Remote Filtering Server Linking Service Sync Service Directory Agent Real-Time Monitor Websense Content Gateway TRITON - Data Security Protector SMTP agent Microsoft ISA agent Endpoint agent Printer agent Integration agent Crawler TRITON - Email Security Email Security Log Server Installing and Deploying Websense Endpoint Clients Deploying Websense endpoints Uninstalling endpoint software Multiple agent limitations Configuring endpoint software Initial Configuration Initial configuration (all deployments) Web Security initial configuration Data Security initial configuration Email Security Gateway initial configuration Content Gateway initial configuration Creating and running the script for Logon Agent Configuring a stealth mode NIC Adding or Modifying Components Modifying TRITON Infrastructure Adding Web Security components Adding components to a filtering plug-in only machine Adding or modifying Data Security components Recreating Data Security certificates Repairing Data Security components Changing the Data Security privileged account Changing the domain of a Data Security Server To join a Data Security Server to a domain Adding Email Security components Removing Components Removing TRITON Infrastructure Removing Web Security components Uninstalling Content Gateway Removing Data Security components Removing Email Security components Upgrading Websense software to the latest v7.6.x Performing the upgrade Upgrading Web Security or Web Filter to 7.6.0 Versions supported for upgrade Preparing for the upgrade Upgrade instructions (Windows) Upgrade instructions (Linux) Adding Web Security components during upgrade Changing IP addresses of Web Security components after upgrade New security certificate Upgrading Websense Content Gateway to 7.6.0 Upgrading Websense Content Gateway to v7.6.2 Upgrading to Websense Web Security Gateway Anywhere to v7.6.0 Upgrading to Data Security 7.6.0 Preparing for upgrade of Data Security Upgrading Data Security Management Server Upgrading a supplemental Data Security server or standalone agents Upgrading a Data Security Protector Upgrading Content Gateway with Data Security Upgrading Data Security endpoints Upgrade Notes and Exceptions Upgrading V-Series Appliance to 7.6 Upgrading or Merging Administrators Starting or Stopping Web Security Services Default ports Excluding Websense Files from Antivirus Scans Migrating from MSDE to SQL Server 2008 R2 Express Changing the IP Address, Host Name, or Domain of the TRITON Management Server Changing the IP address of the TRITON management server Changing host name or domain of the TRITON management server Configuring TRITON Infrastructure to new IP address, host name, or domain Configuring Tomcat to a new local IP address Updating the IP address for Email Security Log Server Updating the log database location for Email Security Gateway Re-registering Email Security Gateway with Data Security Configuring TRITON - Web Security with new host name Changing the host name of the Data Security Management Server Changing the domain of the Data Security Management Server Re-registering Websense Data Security components Creating Apache SSL Certificates